ThrottleNet Inc. Blog

 

From the category archives: Security

Read about the latest security breaches, best practices and how to secure your business on the ThrottleNet blog. Check out our security archives below.

Malware, Social Engineering, and your WEBSITE?

By Aaron Oliver

Over the past year cyber security has been thrust to the forefront of cyber related news as there have been several worldwide attacks in the form of malware and ransomware. Most recently the "WannaCry" outbreak that paralyzed thousands of companies’ systems was talked about by every news organization on the planet. But there is another very common cyber threat that you don’t hear about as often, it is responsible for millions of systems being compromised and is often how some of these global events get started. It’s called “Social Engineering”.

Social engineering can take many forms and can be employed in several different ways. An attacker may call and pretend they are with your IT team and ask for information or for remote access to your employees’ systems. Once they gain access to a system attackers can deploy programs that will allow them to log back in later for more investigation into how the network is setup or do malicious things.

Read the rest of entry »

Lessons Learned from WannaCry: How to Respond to Ransomware

The big news in the online security world over the past few weeks was WannaCry – a Ransomware attack that infected over 300,000 Windows PCs in over 150 countries, demanding users fork over $300 (or more) to unlock their machines. 

For now, WannaCry is over, but the magnitude of this ransomware attack can convince copycat cyber criminals to give it a try themselves, as some people were reported to have paid the ransom. As of May 15, the hackers reportedly got away with $50,000 in bitcoin, however, the economic impact of the attack was much costlier, with economists estimating productivity losses of up to $4 billion. That makes us want to...well, cry.  

Read the rest of entry »

Phishing Awareness: How to Identify a Phishing Attack

 

identify-a-phishing-attackPhishing is one of the most common tactics cyber criminals use to try to extract confidential information from unsuspecting victims. Every day, over 160 million phishing emails are sent and 10% of those make it through filters. Half of those emails – about 8 million are opened. About 80,000 people fall for phishing attacks every single day. 

Sometimes, phishing emails are so outlandish that it’s easy to identify a phishing attack. Others? not so much.

There are serious consequences for phishing victims and their employers, including loss of productivity, bandwidth and access to accounts – not to mention the financial implications that can occur.

Here are a few examples of how you can avoid phishing before falling victim.

Read the rest of entry »

Should Data Breach Notification Laws Change at the National Level?

national-data-breach-lawsAny day, we are expecting an executive order from the President aimed at cyber security, outlining which department heads within government agencies would be held accountable for maintaining and reporting on cyber security, while modernizing government equipment to minimize cyber security risks. While these are much needed, data breach notification laws at the national level are something we would also like to see addressed in the near future.

In Canada, where only 30% of CEOs in the country feel confident about their existing security measures, privacy laws are being updated to force companies to speak up. Australia has also agreed to new data breach notification laws recently. Should the same happen here?

 

Read the rest of entry »

Public Wi-Fi Dangers You Should Be Aware Of

dangers-of-public-wifiPublic Wi-Fi is becoming a necessity in coffee shops, shopping malls and sports stadiums, but just how secure is it? A recent video and article published by Android Authority explain public Wi-Fi dangers and just how vulnerable these systems are. With just a little bit of work, someone can easily capture data from a public Wi-Fi network without you ever knowing.

 

 

 

When using a public W-Fi hotspot, you are always running some risk, but the dangers of public Wi-Fi can generally be avoided if you follow these tips from ThrottleNet!

Read the rest of entry »

Lessons Learned from the Yahoo Breach-5 Ways You Can Protect Yourself from a Cyberattack

 

The recent cyber beach announced by Yahoo impacted around one billion people worldwide. Millions could have and may still be negatively affected.

In the most recent case, Yahoo announced users had their passwords and information stolen sometime in 2013. This followed a different cyberattack the tech firm announced in September.

Those who may not have seen the ill effects of these breaches may still be at risk. As their data gets circulated among a wide-range of cyber pirates, key personal information can be compromised. Checking accounts can be emptied and credit card numbers stolen.

In addition...

Read the rest of entry »

The Biggest Data Breaches of 2016 – Recapping Recent Cyber Security Breaches & Where We Go from Here

biggest-data-breaches-of-2016A year can’t go by without adding to the list of biggest data breaches in history, and 2016 was no different. ZDNet is reporting an estimated 2.2 billion records were exposed in 2016, with almost 3,000 public data breaches occurring during 2016 alone. As we close out the year, we examine some of the biggest recent cyber security breaches that took place, how they happened and what companies can do to prevent them from occurring again.

Read the rest of entry »

Christmas Shopping Safety Tips – How to Know a Website is Safe to Buy From

christmas-shopping-securityIn just a few short days, the Christmas shopping season officially kicks off with the madness that is Black Friday before moving online with Cyber Monday.

‘Tis the time for deals, but biting on the wrong one can turn the calendar from Cyber Monday to Ticked Off Tuesday.

Christmas shoppers are the perfect victims for scammers, and as commerce has shifted online so have their deceptive tactics, but there are ways to stay safe this holiday season – just follow these Christmas shopping safety tips from your friends at ThrottleNet.

Read the rest of entry »

Small Business Cyber Security: An owner’s guide to common risks to IT security

network-security-risksAs a small business owner, managing all the risks to IT security yourself can make you go gray at an early age. From securing your files, who enters the building, who takes what home with them and everything else, there is a lot going on and a lot riding on small business cyber security.

It’s easy to overlook all of the small business cyber security risks that your company may not be addressing – either because you don’t know it’s a risk, you haven’t encountered it or your current procedures aren’t up to industry standards.

Here are some common risks to IT security and things that you can proactively do about them.

Read the rest of entry »

Bans on Dumb Passwords: Elimination of Common Passwords Should Help Internet Security

 

123456. Password. 12345678. Qwerty. Abc123. Iloveyou.

These common passwords are dumb passwords.

Microsoft knows this.

You should too.

The everlasting and ongoing battle for internet security starts with the end-user ensuring their password can’t be hacked by common sense.

While leaked passwords are certainly never a good thing, Microsoft is making some good from data about common passwords compromised during leaks.

Read the rest of entry »